2025
|
G/S
|
COMPUTER HARDWARE IN THE FIELD OF CYBERSECURITY AND COMPUTER SECURITY; DOWNLOADABLE AND RECORDED ... |
|
G/S
|
computer hardware in the field of cybersecurity and computer security; downloadable and recorded ... |
|
Invention
|
Symbol mapping system for concurrent kernel and user space debugging of a virtual machine.
A ran... |
|
G/S
|
Downloadable and recorded computer software and firmware for the protection of third party comput... |
|
G/S
|
Training services in the fields of cybersecurity, computer security, network security, and data s... |
2024
|
Invention
|
Systems and methods for model-based cyber vulnerability assesment.
A system includes one or more... |
|
G/S
|
Computer hardware in the field of cybersecurity and computer security; downloadable and recorded ... |
2023
|
Invention
|
System for aggregating program analysis tools.
A system for aggregating program analysis tools d... |
|
Invention
|
Systems and methods for automated generation of playbooks for responding to cyberattacks.
A cybe... |
|
Invention
|
Systems and methods for automated neutralization of ids detected malware threats.
A malware neut... |
2022
|
Invention
|
Adaptive data selection and reporting. A method, comprising: detecting a first cyber event; insta... |
|
Invention
|
Magnetic device emplacement tool.
A system includes a magnetic device and an emplacement tool. T... |
2021
|
G/S
|
Providing online, non-downloadable news articles related to cybersecurity and cybersecurity profe... |
|
G/S
|
Providing online information related to cybersecurity; Providing online information related to cy... |
|
Invention
|
Context-aware, intelligent beaconing. A device and method for context-aware, intelligent beaconin... |
|
Invention
|
In-vehicle network intrusion detection using unsupervised learning.
Discussed herein are devices... |
|
Invention
|
Systems and methods for evasive resiliency countermeasures. Evasive resiliency countermeasures te... |
|
Invention
|
Concurrent kernel and user space debugging of guest software on a virtual machine in the presence... |
|
Invention
|
Symbol mapping system for concurrent kernel and user space debugging of a virtual machine. A meth... |
|
Invention
|
Replacing compromised data in a self-healing system. A method for use in a computing system, comp... |
|
Invention
|
Annotated deterministic trace abstraction for advanced dynamic program analysis. A virtual machin... |
2020
|
Invention
|
Detecting anomalies on a controller area network bus. A process detects anomalies on a controller... |
|
Invention
|
System memory context determination for integrity monitoring and related techniques. Techniques a... |
|
Invention
|
Non-invasive program execution protection. A method for use in a computing device having a proces... |
|
Invention
|
Deterministic execution replay for multicore systems. Techniques are disclosed for interposing on... |
|
G/S
|
Downloadable computer software for the development, testing, analyzing and debugging of computer ... |
|
Invention
|
Detection of an unauthorized modification to storage and restoration of the storage. An aspect in... |
|
Invention
|
Detection of malicious operating system booting and operating system loading. A system detects de... |
|
Invention
|
Bi-directional interpositioning of virtual hardware. A method is provided comprising: retrieving ... |
|
Invention
|
Analog waveform monitoring for real-time device authentication. A method that includes operating ... |
|
G/S
|
Computer hardware and embedded computer software for cybersecurity, for defending against cyber-a... |
|
G/S
|
Downloadable and recorded computer software for cybersecurity, for defending against cyber-attack... |
|
G/S
|
downloadable and recorded computer software for monitoring computer systems for cybersecurity pur... |
|
Invention
|
Adaptive, multi-layer enterprise data protection and resiliency platform. A system for data prote... |
|
Invention
|
Root of trust assisted access control of secure encrypted drives. A system for data protection in... |
|
Invention
|
Function summarization via type inference. A system and method for function summarization. In som... |
|
Invention
|
System and method for prioritizing and ranking static analysis results using machine learning. A ... |
|
Invention
|
System and method for fuzzing test orchestration using reinforcement learning. A method includes ... |
2019
|
Invention
|
System validation by hardware root of trust (hrot) device and system management mode (smm). Techn... |
|
Invention
|
Architecture agnostic replay verfication. According to aspects of the disclosure a method is prov... |
|
Invention
|
Patching a binary file. Generally discussed herein are systems, apparatuses, and methods for patc... |
|
Invention
|
Bus monitoring system for detecting anomalies indicative of malfunctions or cyber-attacks. An app... |
|
Invention
|
Low-cost physical tamper detection and response for cryptographically secure sanitization. An int... |
|
Invention
|
Serial data bus node identification system. A vehicle includes a data communication network, a se... |
|
Invention
|
Hacker-resistant anti-debug system. A computer system includes an operating system, a memory coup... |
|
Invention
|
Model specific register (msr) instrumentation. Techniques are disclosed for dynamic access and in... |
|
Invention
|
Policy engine for cyber anomaly detection. An industrial control system (ICS) communicates via IC... |
|
Invention
|
Cross-domain solution using network-connected hardware root-of-trust device. The concepts, system... |
|
Invention
|
System and method for booting processors with encrypted boot image. The concepts, systems and met... |
|
Invention
|
Controlling security state of commercial off the shelf (cots) system. The concepts, systems and m... |
2018
|
Invention
|
Parallel data flow analysis processing to stage automated vulnerability research. A method for da... |
|
Invention
|
Estimation of guest clock value based on branch instruction count and average time between branch... |
|
Invention
|
Multi-mode tracking device. A multimode tracking device includes a line of site (LOS) antenna; an... |
|
Invention
|
Policy generation in airborne systems. A method can include detection of policy anomalies in pack... |
|
Invention
|
Cybersecurity by i/o inferred from execution traces. A method can include for vulnerability analy... |
2016
|
Invention
|
Central emulator device and method for distributed emulation. Embodiments of a central emulator, ... |
2015
|
G/S
|
Computer software for providing situational awareness to enable users to better understand, and m... |
2013
|
Invention
|
Technique for hypervisor-based firmware acquisition and analysis. A method includes detecting a t... |
|
Invention
|
Hypervisor-based binding of data to cloud environment for improved security. A method includes re... |
|
Invention
|
Technique for verifying virtual machine integrity using hypervisor-based memory snapshots. A meth... |
|
Invention
|
Automatic algorithm discovery using reverse dataflow analysis. A system and method for finding vu... |
|
Invention
|
System and method for hypervisor breakpoints. Methods and systems allow the use of hypervisors to... |
|
G/S
|
Software that enables users to intercept, monitor, collect, record and analyze communications; mo... |
2010
|
G/S
|
Providing services in the field of administration and support of existing and prospective custome... |
|
G/S
|
[ Installation and maintenance of computer and communications network hardware used in the wirele... |
|
G/S
|
Computer software for communication and visualization functions between mobile communications dev... |
|
G/S
|
Consulting services in the area of information technology security |
2007
|
G/S
|
computer software for the protection of third party software to prevent against reverse engineeri... |
1999
|
G/S
|
Security Consultation services, namely, physical, infrastructure, building and personal security;... |